z-logo
open-access-imgOpen Access
Indistinguishable of AES-Based PRNG against Modification Attack Based on Statistical Distance Tests and Entropy Measures
Author(s) -
Santi Indarjani,
Belawati Widjaja
Publication year - 2013
Publication title -
lecture notes on software engineering
Language(s) - English
Resource type - Journals
ISSN - 2301-3559
DOI - 10.7763/lnse.2013.v1.68
Subject(s) - pseudorandom number generator , computer science , computer security , mathematics , statistics
Due to previous research, AES-based PRNG is not affected by insertion attack (in random manner) under level of significant α = 0.01, even it caused some failed tests in randomness. Completing the research, the writers do the observation of the modification attack in random manner against the output sequence of AES-based PRNG that is limited to 1-bit modification attack. The tests are performed by applying statistical distance test between the output sequence before and after the attack. To assure the attack effect, we also measure the entropy values of the sequence before and after attack and compare them. The attack scenario is still the same as the previous research [see 3], except replacing the insertion with modification and parameter = 0.001. The results show that the modification attack does not give the significant effect on the randomness property of the AES-based PRNG. It was proved from 60 experiments of 1-bit modification attack, that the maximum statistical distances are still far away from = 0.001. And the change of the entropy source after the attack are very small and also still far away from the = 0.001.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom